Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images
Due to the powerful image editing tools images are open to several manipulations; therefore, their authenticity is becoming questionable especially when images have influential power, for example, in a court of law, news reports, and insurance claims. Image forensic techniques determine the integrit...
Gespeichert in:
Veröffentlicht in: | Mathematical problems in engineering 2016-01, Vol.2016 (2016), p.1-13 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 13 |
---|---|
container_issue | 2016 |
container_start_page | 1 |
container_title | Mathematical problems in engineering |
container_volume | 2016 |
creator | Shah, Mohsin Ashraf, Rehan Irtaza, Aun Nawaz, Tabassam Mahmood, Toqeer Mahmood, Muhammad Tariq |
description | Due to the powerful image editing tools images are open to several manipulations; therefore, their authenticity is becoming questionable especially when images have influential power, for example, in a court of law, news reports, and insurance claims. Image forensic techniques determine the integrity of images by applying various high-tech mechanisms developed in the literature. In this paper, the images are analyzed for a particular type of forgery where a region of an image is copied and pasted onto the same image to create a duplication or to conceal some existing objects. To detect the copy-move forgery attack, images are first divided into overlapping square blocks and DCT components are adopted as the block representations. Due to the high dimensional nature of the feature space, Gaussian RBF kernel PCA is applied to achieve the reduced dimensional feature vector representation that also improved the efficiency during the feature matching. Extensive experiments are performed to evaluate the proposed method in comparison to state of the art. The experimental results reveal that the proposed technique precisely determines the copy-move forgery even when the images are contaminated with blurring, noise, and compression and can effectively detect multiple copy-move forgeries. Hence, the proposed technique provides a computationally efficient and reliable way of copy-move forgery detection that increases the credibility of images in evidence centered applications. |
doi_str_mv | 10.1155/2016/8713202 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1825520473</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>4086504691</sourcerecordid><originalsourceid>FETCH-LOGICAL-c393t-526887fb3a0741bcd646f7e1db15426950a948e340ba461cdf524afdb9b10eca3</originalsourceid><addsrcrecordid>eNqF0E1Lw0AQBuAgCtbqzbMEvAgau7Mf-TiW1qrQ4qWCt7DZTNotabbupkr-vVtSELx4moF5GGbeILgG8gggxIgSiEdpAowSehIMQMQsEsCTU98TyiOg7OM8uHBuQwgFAekgWEzMrosW5gvDmbErtF04xRZVq00TLlGtG_25x7Ay9jDHxmkVjhtZd067UDfhVK90K-vwdStX6C6Ds0rWDq-OdRi8z56Wk5do_vb8OhnPI8Uy1kaCxmmaVAWTJOFQqDLmcZUglAUITuNMEJnxFBknheQxqLISlMuqLLICCCrJhsFdv3dnjT_PtflWO4V1LRs0e5dDSoWghCfM09s_dGP21n_gVZIJD1ORevXQK2WNcxarfGf1VtouB5Ifss0P2ebHbD2_7_laN6X81v_pm16jN1jJXw1AEyHYD1P8gS0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1795825858</pqid></control><display><type>article</type><title>Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images</title><source>Wiley-Blackwell Open Access Titles</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Shah, Mohsin ; Ashraf, Rehan ; Irtaza, Aun ; Nawaz, Tabassam ; Mahmood, Toqeer ; Mahmood, Muhammad Tariq</creator><contributor>Peng, Haipeng</contributor><creatorcontrib>Shah, Mohsin ; Ashraf, Rehan ; Irtaza, Aun ; Nawaz, Tabassam ; Mahmood, Toqeer ; Mahmood, Muhammad Tariq ; Peng, Haipeng</creatorcontrib><description>Due to the powerful image editing tools images are open to several manipulations; therefore, their authenticity is becoming questionable especially when images have influential power, for example, in a court of law, news reports, and insurance claims. Image forensic techniques determine the integrity of images by applying various high-tech mechanisms developed in the literature. In this paper, the images are analyzed for a particular type of forgery where a region of an image is copied and pasted onto the same image to create a duplication or to conceal some existing objects. To detect the copy-move forgery attack, images are first divided into overlapping square blocks and DCT components are adopted as the block representations. Due to the high dimensional nature of the feature space, Gaussian RBF kernel PCA is applied to achieve the reduced dimensional feature vector representation that also improved the efficiency during the feature matching. Extensive experiments are performed to evaluate the proposed method in comparison to state of the art. The experimental results reveal that the proposed technique precisely determines the copy-move forgery even when the images are contaminated with blurring, noise, and compression and can effectively detect multiple copy-move forgeries. Hence, the proposed technique provides a computationally efficient and reliable way of copy-move forgery detection that increases the credibility of images in evidence centered applications.</description><identifier>ISSN: 1024-123X</identifier><identifier>EISSN: 1563-5147</identifier><identifier>DOI: 10.1155/2016/8713202</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Blurring ; Colleges & universities ; Computer engineering ; Computer science ; Decomposition ; Digital imaging ; Digital signatures ; Editing ; Forensic engineering ; Forensic sciences ; Forgery ; Image compression ; Image detection ; Mathematical analysis ; Noise ; Principal components analysis ; Representations ; Reproduction ; State-of-the-art reviews ; Wavelet transforms</subject><ispartof>Mathematical problems in engineering, 2016-01, Vol.2016 (2016), p.1-13</ispartof><rights>Copyright © 2016 Toqeer Mahmood et al.</rights><rights>Copyright © 2016 Toqeer Mahmood et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c393t-526887fb3a0741bcd646f7e1db15426950a948e340ba461cdf524afdb9b10eca3</citedby><cites>FETCH-LOGICAL-c393t-526887fb3a0741bcd646f7e1db15426950a948e340ba461cdf524afdb9b10eca3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><contributor>Peng, Haipeng</contributor><creatorcontrib>Shah, Mohsin</creatorcontrib><creatorcontrib>Ashraf, Rehan</creatorcontrib><creatorcontrib>Irtaza, Aun</creatorcontrib><creatorcontrib>Nawaz, Tabassam</creatorcontrib><creatorcontrib>Mahmood, Toqeer</creatorcontrib><creatorcontrib>Mahmood, Muhammad Tariq</creatorcontrib><title>Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images</title><title>Mathematical problems in engineering</title><description>Due to the powerful image editing tools images are open to several manipulations; therefore, their authenticity is becoming questionable especially when images have influential power, for example, in a court of law, news reports, and insurance claims. Image forensic techniques determine the integrity of images by applying various high-tech mechanisms developed in the literature. In this paper, the images are analyzed for a particular type of forgery where a region of an image is copied and pasted onto the same image to create a duplication or to conceal some existing objects. To detect the copy-move forgery attack, images are first divided into overlapping square blocks and DCT components are adopted as the block representations. Due to the high dimensional nature of the feature space, Gaussian RBF kernel PCA is applied to achieve the reduced dimensional feature vector representation that also improved the efficiency during the feature matching. Extensive experiments are performed to evaluate the proposed method in comparison to state of the art. The experimental results reveal that the proposed technique precisely determines the copy-move forgery even when the images are contaminated with blurring, noise, and compression and can effectively detect multiple copy-move forgeries. Hence, the proposed technique provides a computationally efficient and reliable way of copy-move forgery detection that increases the credibility of images in evidence centered applications.</description><subject>Blurring</subject><subject>Colleges & universities</subject><subject>Computer engineering</subject><subject>Computer science</subject><subject>Decomposition</subject><subject>Digital imaging</subject><subject>Digital signatures</subject><subject>Editing</subject><subject>Forensic engineering</subject><subject>Forensic sciences</subject><subject>Forgery</subject><subject>Image compression</subject><subject>Image detection</subject><subject>Mathematical analysis</subject><subject>Noise</subject><subject>Principal components analysis</subject><subject>Representations</subject><subject>Reproduction</subject><subject>State-of-the-art reviews</subject><subject>Wavelet transforms</subject><issn>1024-123X</issn><issn>1563-5147</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqF0E1Lw0AQBuAgCtbqzbMEvAgau7Mf-TiW1qrQ4qWCt7DZTNotabbupkr-vVtSELx4moF5GGbeILgG8gggxIgSiEdpAowSehIMQMQsEsCTU98TyiOg7OM8uHBuQwgFAekgWEzMrosW5gvDmbErtF04xRZVq00TLlGtG_25x7Ay9jDHxmkVjhtZd067UDfhVK90K-vwdStX6C6Ds0rWDq-OdRi8z56Wk5do_vb8OhnPI8Uy1kaCxmmaVAWTJOFQqDLmcZUglAUITuNMEJnxFBknheQxqLISlMuqLLICCCrJhsFdv3dnjT_PtflWO4V1LRs0e5dDSoWghCfM09s_dGP21n_gVZIJD1ORevXQK2WNcxarfGf1VtouB5Ifss0P2ebHbD2_7_laN6X81v_pm16jN1jJXw1AEyHYD1P8gS0</recordid><startdate>20160101</startdate><enddate>20160101</enddate><creator>Shah, Mohsin</creator><creator>Ashraf, Rehan</creator><creator>Irtaza, Aun</creator><creator>Nawaz, Tabassam</creator><creator>Mahmood, Toqeer</creator><creator>Mahmood, Muhammad Tariq</creator><general>Hindawi Publishing Corporation</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7TB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>CWDGH</scope><scope>DWQXO</scope><scope>FR3</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>KR7</scope><scope>L6V</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20160101</creationdate><title>Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images</title><author>Shah, Mohsin ; Ashraf, Rehan ; Irtaza, Aun ; Nawaz, Tabassam ; Mahmood, Toqeer ; Mahmood, Muhammad Tariq</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c393t-526887fb3a0741bcd646f7e1db15426950a948e340ba461cdf524afdb9b10eca3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Blurring</topic><topic>Colleges & universities</topic><topic>Computer engineering</topic><topic>Computer science</topic><topic>Decomposition</topic><topic>Digital imaging</topic><topic>Digital signatures</topic><topic>Editing</topic><topic>Forensic engineering</topic><topic>Forensic sciences</topic><topic>Forgery</topic><topic>Image compression</topic><topic>Image detection</topic><topic>Mathematical analysis</topic><topic>Noise</topic><topic>Principal components analysis</topic><topic>Representations</topic><topic>Reproduction</topic><topic>State-of-the-art reviews</topic><topic>Wavelet transforms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shah, Mohsin</creatorcontrib><creatorcontrib>Ashraf, Rehan</creatorcontrib><creatorcontrib>Irtaza, Aun</creatorcontrib><creatorcontrib>Nawaz, Tabassam</creatorcontrib><creatorcontrib>Mahmood, Toqeer</creatorcontrib><creatorcontrib>Mahmood, Muhammad Tariq</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Middle East & Africa Database</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>Mathematical problems in engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shah, Mohsin</au><au>Ashraf, Rehan</au><au>Irtaza, Aun</au><au>Nawaz, Tabassam</au><au>Mahmood, Toqeer</au><au>Mahmood, Muhammad Tariq</au><au>Peng, Haipeng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images</atitle><jtitle>Mathematical problems in engineering</jtitle><date>2016-01-01</date><risdate>2016</risdate><volume>2016</volume><issue>2016</issue><spage>1</spage><epage>13</epage><pages>1-13</pages><issn>1024-123X</issn><eissn>1563-5147</eissn><abstract>Due to the powerful image editing tools images are open to several manipulations; therefore, their authenticity is becoming questionable especially when images have influential power, for example, in a court of law, news reports, and insurance claims. Image forensic techniques determine the integrity of images by applying various high-tech mechanisms developed in the literature. In this paper, the images are analyzed for a particular type of forgery where a region of an image is copied and pasted onto the same image to create a duplication or to conceal some existing objects. To detect the copy-move forgery attack, images are first divided into overlapping square blocks and DCT components are adopted as the block representations. Due to the high dimensional nature of the feature space, Gaussian RBF kernel PCA is applied to achieve the reduced dimensional feature vector representation that also improved the efficiency during the feature matching. Extensive experiments are performed to evaluate the proposed method in comparison to state of the art. The experimental results reveal that the proposed technique precisely determines the copy-move forgery even when the images are contaminated with blurring, noise, and compression and can effectively detect multiple copy-move forgeries. Hence, the proposed technique provides a computationally efficient and reliable way of copy-move forgery detection that increases the credibility of images in evidence centered applications.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2016/8713202</doi><tpages>13</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1024-123X |
ispartof | Mathematical problems in engineering, 2016-01, Vol.2016 (2016), p.1-13 |
issn | 1024-123X 1563-5147 |
language | eng |
recordid | cdi_proquest_miscellaneous_1825520473 |
source | Wiley-Blackwell Open Access Titles; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection |
subjects | Blurring Colleges & universities Computer engineering Computer science Decomposition Digital imaging Digital signatures Editing Forensic engineering Forensic sciences Forgery Image compression Image detection Mathematical analysis Noise Principal components analysis Representations Reproduction State-of-the-art reviews Wavelet transforms |
title | Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T02%3A20%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Copy-Move%20Forgery%20Detection%20Technique%20for%20Forensic%20Analysis%20in%20Digital%20Images&rft.jtitle=Mathematical%20problems%20in%20engineering&rft.au=Shah,%20Mohsin&rft.date=2016-01-01&rft.volume=2016&rft.issue=2016&rft.spage=1&rft.epage=13&rft.pages=1-13&rft.issn=1024-123X&rft.eissn=1563-5147&rft_id=info:doi/10.1155/2016/8713202&rft_dat=%3Cproquest_cross%3E4086504691%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1795825858&rft_id=info:pmid/&rfr_iscdi=true |